oss-sec mailing list archives
Re: CVE Request: PHP-5.5.33: Use after free in WDDX Deserialize when processing XML data
From: cve-assign () mitre org
Date: Mon, 14 Mar 2016 00:29:41 -0400 (EDT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
https://bugs.php.net/bug.php?id=71587
Use CVE-2016-3141. - -- CVE Assignment Team M/S M300, 202 Burlington Road, Bedford, MA 01730 USA [ A PGP key is available for encrypted communications at http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJW5j3gAAoJEL54rhJi8gl5mF0P+gJGRd7gKQIEY0r/pKdf18Ay SC8hAOCPDGfg8rYkPDUDBaoCjgkM29T9AuZJ3pCkfys3vzE2/G4XCRB8EysowGBj 0jlaVZE54TrvnVXdZ8rsAFOz0m29pjjGwYXIsxZLjDoBxGOtU0PBAdz9zCbyP4ws BoTHvwRsMGa8dcRqUnFoLMlBd0lSteVFiv8d3w2tEu+vIRhr//VUn1dGvb94l65n TgP+oMqE9PPr4S8MdUvMFd6XzuoCj8nQ5MJXce2aJzPdQnkgNOa4U+cGLQDykAX2 fHQXjguU/2N1+F6xAy7ydh9ywpNpDFla01ayvbIFC3aXtiA5ONdcYunB9lMWoq04 wK0FhxH0/UD/Msp6jBjWQdvFlAuQJwuDqiuD8Dcs/Am+4PMAtP06gl06aIqjEk88 NXktFkkzHSfoczzkwSRp6J023bLdrTykcXsk3O5/hsrB4XsrlERGYT5TgqknAriK zPIh5IKK88u5UfrilGfYZgIQYt2++j+4ZKoYIl/q/3NzTmCt+/zKelLFQSFwR4FX RuPiWSMIqqchsesgHDgFSnvoAsP3d0hqcX2RBjwhBvxdpVG2LhGJgK91hrey14L1 xaK4fAq4W2mx+yC12qgWZYQVz5EYQpR+qti8mv1sexKuAbyUx6YXUEMN6eglubQs dV7j9iBVgzYJGlDGLuZe =DTa5 -----END PGP SIGNATURE-----
Current thread:
- CVE Request: PHP-5.5.33: Use after free in WDDX Deserialize when processing XML data Dmitry Kasyanov (Mar 13)
- Re: CVE Request: PHP-5.5.33: Use after free in WDDX Deserialize when processing XML data cve-assign (Mar 13)